Prepare a digital forensic report

Assignment Help Case Study
Reference no: EM131967095 , Length: word count:2000

Assignment - Tasks and Forensics Report

Task 1: Recovering scrambled bits

For this task I will upload a text file with scrambled bits on the Interact site closer to the assignment due date. You will be required to restore the scrambled bits to their original order and copy the plain text in your assignment.

Describe the process used in restoring the scrambled bits and insert plain text in the assignment.

Task 2: Digital Forensics Report

In this major task you are assumed a digital forensics investigator and asked to prepare a digital forensic report for the following scenario:

You are investigating a possible intellectual property theft by a contract employee of Exotic Mountain Tour Service (EMTS). EMTS has just finished an expensive marketing and customer service analysis with Superior Bicycles, LLC. Based on this analysis, EMTS plans to release advertising for its latest tour service with a joint product marketing campaign with Superior Bicycles. Unfortunately, EMTS suspects that a contract travel consultant, Bob Aspen, might have given sensitive marketing data to another bicycle competitor. EMTS is under a nondisclosure agreement with Superior Bicycles and must protect this advertising campaign material.

An EMTS manager found a USB drive on the desk Bob Aspen was assigned to. Your task is to determine whether the drive contains proprietary EMTS or Superior Bicycles data. The EMTS manager also gives you some interesting information he gathered from the Web server administrator. EMTS filters all Web-based e-mail traffic traveling through its network and detects suspicious attachments. When a Web-based e-mail with attachments is received, the Web filter is triggered. The EMTS manager gives you two screen captures, shown in Figures 8-5 and 8-6 (Textbook page 327), of partial e-mails intercepted by the Web filter that lead him to believe Bob Aspen might have engaged in questionable activities. (Nelson, Phillips, & Steuart, 2015, p. 326-327)

Deliverable: For this forensic examination, you need to search all possible places data might be hiding and submit a digital forensics report of 1800-2000 word.

Rationale
This assessment task covers data validation, e-discovery, steganography, reporting and presenting, and has been designed to ensure that you are engaging with the subject content on a regular basis. More specifically it seeks to assess the learning outcomes:
- determine the legal and ethical considerations for investigating and prosecuting digital crimes
- analyse data on storage media and various file systems
- collect electronic evidence without compromising the original data;
- evaluate the functions and features of digital forensics equipment, the environment and the tools for a digital forensics lab;
- compose technical tactics in digital crimes and assess the steps involved in a digital forensics investigation;
- prepare and defend reports on the results of an investigation

Presentation

The following should be included as minimum requirements in the report structure:
- Executive Summary or Abstract
This section provides a brief overview of the case, your involvement as an examiner, authorisation, major findings and conclusion
- Table of Contents
- Introduction
Background, scope of engagement, forensics tools used and summary of findings
- Analysis Conducted
o Description of relevant programs on the examined items
o Techniques used to hide or mask data, such as encryption, steganography, hidden attributes, hidden partitions etc
o Graphic image analysis
- Findings
This section should describe in greater detail the results of the examinations and may include:
o Specific files related to the request
o Other files, including deleted files that support the findings
o String searches, keyword searches, and text string searches
o Internet-related evidence, such as Web site traffic analysis, chat logs, cache files, e-mail, and news group activity
o Indicators of ownership, which could include program registration data.
- Conclusion
Summary of the report and results obtained
- References
You must cite references to all material you have used as sources for the content of your work
- Glossary
A glossary should assist the reader in understanding any technical terms used in the report. Use a generally accepted source for the definition of the terms and include appropriate references.
- Appendices
You can attach any supporting material such as printouts of particular items of evidence, digital copies of evidence, and chain of custody documentation.

Apa referencing style

Reference no: EM131967095

Questions Cloud

Conduct a quantitative and qualitative benchmark review : Assess operations requirements and resources for Pediatric Hospital. Describe what is working and what is not working.
Allopatric speciation and sympatric speciation : Compare and contrast the relationship between the Red Queen Hypothesis and the following paired terms such as (1) macroevolution and microevolution
Generation to the next generation : How is genetic continuity maintained from one generation to the next generation? This discussion must include the specifics of DNA and its replication
Explain federal regulatory strategies used to promote : Compare the workflow of an office using paper charts versus one using electronic health records. In what ways are they different?
Prepare a digital forensic report : In this major task you are assumed a digital forensics investigator and asked to prepare a digital forensic report - restore the scrambled bits
Why menu-driven interfaces continue to be popular : Despite being a fairly old technology, menu-driven interfaces are very common in user interface design.
Discuss about the hazard obstacles and threat obstacles : Examine the alternative techniques and select the one that you would use for obstacle presentation. Defend your selection.
What is the exact probability that you score : What is the exact probability that you score a 5 by using approximation to estimate
Confidence interval for mean difference in government waste : Construct a 95% confidence interval for (the mean difference in government waste.

Reviews

len1967095

5/2/2018 6:52:20 AM

Possible marks 2.0 – 1.7 1.6 – 1.5 1.4 – 1.3 1.2 – 1.0 0.9 – 0 Glossary / Appendices: (2 marks) Glossary of technical terms used in the report is provided which has generally acceptable source of definition of the terms and appropriate references are included. Relevant supporting material is provided in appendices to demonstrate the evidence. Glossary of technical terms used in the report is provided which has mostly acceptable source of definition of the terms and appropriate references are included. Some supporting material is provided in appendices to demonstrate the evidence. Glossary of some technical terms used in the report is provided which has mostly acceptable source of definition of the terms and appropriate references are included. Some supporting material is provided in appendices to demonstrate the evidence. Glossary of some technical terms used in the report is provided however terms are not generally common and some references are missing. Some supporting material is provided in appendices. Most terminologies are missing. Appendices are either not provided or are irrelevant.

len1967095

5/2/2018 6:52:15 AM

Possible marks 3.0 – 2.55 2.54 – 2.25 2.24 – 1.95 1.94 – 1.5 1.4 – 0 References: Must cite references to all material used as sources for the content (2 marks) APA 6th edition referencing applied to a range of relevant resources. No referencing errors. Direct quotes used sparingly. Sources all documented. APA 6th edition referencing applied to a range of relevant resources. No more than 2 referencing errors. Direct quotes used sparingly. Sources all documented. APA 6th edition referencing applied to a range of relevant resources. No more than 3 errors. Direct quotes used in-context. Sources all documented. APA 6th edition referencing applied to a range of relevant resources. No more than 4 errors. Direct quotes used in-context. Some sources documented. Referencing not done to the APA 6th edition standard. Over-use of direct quotes. Range of sources used is not appropriate and/or not documented.

len1967095

5/2/2018 6:52:09 AM

Possible marks 5.0 – 4.25 4.24 – 3.75 3.74 – 3.25 3.24 – 2.5 2.4 – 0 Conclusion: Summary, Results (3 marks) High level summary of results is provided which is consistent with the report. Well summarised results and mostly consistent with the findings. Good summary of results. Able to relate the results with findings. No new material is included. Satisfies the minimum requirements. Results are not really consistent with the findings. Fails to satisfy minimum requirements of summarising the results.

len1967095

5/2/2018 6:52:02 AM

Possible marks 5.0 – 4.25 4.24 – 3.75 3.74 – 3.25 3.24 – 2.5 2.4 – 0 Findings: specific files/images, type of searches, type of evidence, indicators of ownership (5 marks) A greater detail of findings is provided. Keywords and string searches are listed very clearly. Evidence found is very convincing. Indication of ownership is very clear. Findings are provided, keywords and string searchers are listed. Evidence is sound. Ownership is clear. Findings are provided, some keywords are listed. Evidence is reasonable which relates to the ownership. Findings are provided but are somewhat vague. Keywords and strings are not very clear. Evidence found may be questionable. Fails to satisfy minimum requirements providing findings.

len1967095

5/2/2018 6:51:57 AM

Possible marks 3.0 – 2.55 2.54 – 2.25 2.24 – 1.95 1.94 – 1.5 1.4 – 0 Analysis: relevant programs, techniques, graphics (5 marks) Description of analysis is clear and appropriate programs and techniques are selected. Very good graphic image analysis. Description of analysis is clear and mostly appropriate programs and techniques are selected. Good graphic image analysis. Description of analysis is clear and mostly appropriate programs and techniques are selected. Reasonable graphic image analysis. Description of analysis is not completely relevant. Little or no graphics image analysis provided. Fails to satisfy minimum requirements of analysis.

len1967095

5/2/2018 6:51:52 AM

Criteria HD 100% - 85% DI 84% - 75% CR 74% - 65% PS 64% - 50% FL 50% - 0 Introduction: Background, scope of engagement, tools and findings (3 marks) All elements are present, well expressed, comprehensive and accurate. All elements are present and largely accurate and well expressed. All elements are present with few inaccuracies. Most elements are present possibly with some inaccuracies. Fails to satisfy minimum requirements of introduction.

len1967095

5/2/2018 6:51:44 AM

Task 1: Recovering scrambled bits (5 Marks) Criteria HD 100% - 85% DI 84% - 75% CR 74% - 65% PS 64% - 50% FL 50% - 0 Successfully recovering the scrambled bits to their original order(5 marks) Scrambled bits are restored to the original text. Tool used to decode the text is mentioned and justification to use the tool is also provided. The process to restore the scrambled bits is clearly described with screenshots inserted of all steps. Scrambled bits are restored to the original text. Tool used to decode the text is mentioned but the justification is not very clear. The process to restore the scrambled bits is described with some screenshots. Scrambled bits are restored to the original text. Tool used to decode the text is mentioned but the justification is not very clear. The process to restore the scrambled bits is described but no screenshots provided. Scrambled bits are restored to the original text. No justification of tool used is provided, process seems to be somewhat vague. Scrambled bits are restored but not matching with the original text. Tool is not mentioned and process is not described.

Write a Review

Case Study Questions & Answers

  Discuss the major issues presented in the case

Read Case Study 1, "Bernie Madoff: How "One Big Lie" Can Destroy Thousands of Lives," on pages 258-264. Summarize the overall viewpoint of the author, and discuss the major issues presented in the case

  Case study on integrating supply chains

What were the incentives on addressing customer-facing aspects first and what were the drawbacks on addressing customer-facing aspects first?

  Types of bullying to which amanda todd was subjected

Describe at least two (2) types of bullying to which Amanda Todd was subjected. Identify at least three (3) consequences that Amanda Todd experienced as a result of being bullied, and discuss her attempts to deal with them

  What are the underlying root problems in given case study

What surface problems do you notice? What are the underlying root problems? What actions would you recommend Edna to take? Create your discussion using the 4 key steps of a Case Study.

  Case study- age and the workplace

Why is Matthew hesitant about giving Peter negative feedback? List at least three reasons and explain why and  Why was Peter so offended? How should Peter respond to this situation? Substantiate your answer.

  How you would design the next campaign

How could this segmentation be best utilised for direct marketing activity - is it a success, should it be used at all and how you would design the next campaign - would you do anything different?

  Create new average and range control charts from your data

Create new X-bar and R (average and range) control charts from your updated data. Discuss how the two sets of control charts are different. What has changed?

  Managing change - analysis of a hypothetical case

Effectively communicate an appropriate solution to a particular change management and leadership case under investigation.

  What are the most important qualities for a parent

What are the most important qualities for a parent to have, and why - What personal characteristics do you hope your young adult son or daughter will possess

  Is deeres tactic an appropriate one

What are the implications of this tactic and the possible consequences, positive or negative - If it is not an appropriate tactic, what are some other alternatives?

  How would you judge a successful project

Are project management tools a hindrance or a help? Explain your answer - address the software issues that occurred in this the Polaris case?

  What are the barriers to achieving stakeholders goal

What are the barriers to achieving their goal for each stakeholder? How would YOU solve the problem of violence against women in this environment?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd